RTX TRAP v1.0 allows attackers to perform a directory traversal via a crafted request sent to the endpoint /data/.
References
Configurations
History
21 Nov 2024, 07:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://medium.com/%40rohitgautam26/cve-2022-31457-2027b7678af7 - |
07 Nov 2023, 03:47
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
02 Aug 2023, 20:47
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:rtx_trap_project:rtx_trap:1.0:*:*:*:*:*:*:* | |
References | (MISC) https://medium.com/@rohitgautam26/cve-2022-31457-2027b7678af7 - Third Party Advisory | |
First Time |
Rtx Trap Project
Rtx Trap Project rtx Trap |
25 Jul 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-25 22:15
Updated : 2024-11-21 07:04
NVD link : CVE-2022-31457
Mitre link : CVE-2022-31457
CVE.ORG link : CVE-2022-31457
JSON object : View
Products Affected
rtx_trap_project
- rtx_trap
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')